Feeds

Greenland's super-melty summer

Ice is sooo last season

Providing a secure and efficient Helpdesk

The higher peaks of the Greenland icesheet spent longer melting this summer than any summer since 1988, according to a NASA funded study. The research revealed that enough snow melted in Greenland this year to cover the surface of the USA more than two times over*.

Image of the so-called 2007 Greenland melting anomaly. Credit: NASA

Image of the so-called 2007 Greenland melting anomaly.

Credit: NASA

This so-called melting anomaly is calculated using microwave data from the Special Sensor Microwave Imaging radiometer. It refers to the difference between the number of melting days occuring in 2007 and the average number of melting days during the period 1988 to 2006.

Oddly, the increased melting was predominantly concentrated in higher altitude regions.

"When snow melts at those high altitudes and then refreezes, it can absorb up to four times more energy than fresh, unthawed snow," said Marco Tedesco, a research scientists at the Joint Centre for Earth Systems Technology.

"This can affect Earth's energy budget by changing how much radiation from the sun is absorbed by the Earth versus that reflected back into the atmosphere. Refrozen snow can also alter the snow density, thickness and snow-water content."

Tedesco said the results came as something of a surprise, and demonstrated just how complex the environmental systems of our planet are.

Overall, the time spent melting in Greenland this year was up 30 per cent on the average for the last two decades. This isn't a record peak, but could be indicative of a trend towards longer periods of melting in the region.

Tedesco noted: "Aside from contributing to direct sea level rise, melting especially along the coast can speed up glaciers since the meltwater acts like a lubricant between the frozen surface and the bedrock deep below. The faster glaciers flow, the more water enters the ocean and potentially impacts sea level rise." ®

Click here for a larger version of the picture, with appropriate scale.

*What this is in sheepsecs/multiples of Wales is left as an exercise for the reader.

Internet Security Threat Report 2014

More from The Register

next story
MARS NEEDS WOMEN, claims NASA pseudo 'naut: They eat less
'Some might find this idea offensive' boffin admits
SECRET U.S. 'SPACE WARPLANE' set to return from SPY MISSION
Robot minishuttle X-37B returns after almost 2 years in orbit
LOHAN crash lands on CNN
Overflies Die Welt en route to lively US news vid
Experts brand LOHAN's squeaky-clean box
Phytosanitary treatment renders Vulture 2 crate fit for export
No sail: NASA spikes Sunjammer
'Solar sail' demonstrator project binned
America's super-secret X-37B plane returns to Earth after nearly TWO YEARS aloft
674 days in space for US Air Force's mystery orbital vehicle
Carry On Cosmonaut: Willful Child is a poor taste Star Trek parody
Cringeworthy, crude and crass jokes abound in Steven Erikson’s sci-fi debut
Origins of SEXUAL INTERCOURSE fished out of SCOTTISH LAKE
Fossil find proves it first happened 385 million years ago
Human spacecraft dodge COMET CHUNKS pelting off Mars
Odyssey orbiter yet to report, though - comet's trailing trash poses new threat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.